In previous work we have applied the novel [7] a method originally designed to evaluate automatic machine translation systems, in assessing short essays written by students [16]. In this paper we present a comparative...
详细信息
In previous work we have applied the novel [7] a method originally designed to evaluate automatic machine translation systems, in assessing short essays written by students [16]. In this paper we present a comparative evaluation between this combination algorithms and a system based on BLEU and Latent Semantic Analysis. In addition we propose an effective combination schema for them. We study how much combination approach scores correlate to human scorings and other evaluation metrics. In spite of the simplicity of these shallow NLP methods, they achieve state-of-the art correlations to the teacher's scores while keeping the language-independence and without requiring any domain specific knowledge.
Progressive image transmission is often used in low bandwidth communications or in limited bandwidth environments. When a user browses an image on a website, the web server first sends a low quality image to the recei...
详细信息
Progressive image transmission is often used in low bandwidth communications or in limited bandwidth environments. When a user browses an image on a website, the web server first sends a low quality image to the receiver and then gradually improves the image quality by subsequent transmissions .Because the image size becomes larger and larger, it is essential to develop a flexible and efficient technique to help users quickly browse or retrieve images on a website. For this reason, using significant features along with a prediction technique for progressive image transmission is proposed in this paper. In our method, significant features of an image need to be extracted first. Next, these features, according to their priority, are sent to the receiver. For reducing the encoding cost of the transmitted data, three approaches, sampling, quantization, and linear regression prediction, are also presented.
Frequent set mining (FSM), an important phase of association rule mining, is the process of generating frequent sets that satisfy a specified minimum support threshold. This paper explores FSM in temporal data domain ...
详细信息
Frequent set mining (FSM), an important phase of association rule mining, is the process of generating frequent sets that satisfy a specified minimum support threshold. This paper explores FSM in temporal data domain or FTP mining and proposes an efficient algorithm for the same. Existing algorithms for FTP mining are based on a priori's level wise principle. In conventional or transactional data domain, a priori has been proven to suffer from the repeated scans limitation and has been succeeded by several algorithms that overcome the setback. The proposed algorithm eliminates a priori's repeated scans limitation in temporal domain, requiring only two overall scans of the original input. Experimental results demonstrate the significant improvements in execution time of the proposed algorithm as opposed to the a priori based one
The sharable content object reference model (SCORM) has become a popular standard for sharing and reusing teaching materials in the field of e-learning. However, efficient retrieval of SCORM-compliant learning objects...
详细信息
The sharable content object reference model (SCORM) has become a popular standard for sharing and reusing teaching materials in the field of e-learning. However, efficient retrieval of SCORM-compliant learning objects stored on grid environments is a challenging problem. In this paper, a performance-based approach is proposed to retrieve teaching materials in grid environments. The proposed architecture uses the real-time information gathered by a resource-monitoring tool to estimate the dynamically changing performance of each node, for CPU loading and network bandwidth. In addition, a grid testbed is built to implement the model. Experimental results show that the proposed approach can choose the most appropriate site to reduce the retrieval time
Traditionally, interlibrary cooperation is an important interaction between libraries. Nevertheless, the emerging digital library architecture has not explicitly supported this requirement. In this paper, we proposed ...
详细信息
Traditionally, interlibrary cooperation is an important interaction between libraries. Nevertheless, the emerging digital library architecture has not explicitly supported this requirement. In this paper, we proposed an interlibrary cooperation framework for digital libraries using P2P technology. An application of this framework to Faculty Publication Sharing System was presented. Besides, a reputation model based on data mining is utilized to provide libraries with incentives to join this framework
In this paper, we propose a cooperative control strategy for a group of robotic vehicles to achieve the specified task issued from a high-level astronaut command. The problem is mathematically formulated as designing ...
详细信息
In this paper, we propose a cooperative control strategy for a group of robotic vehicles to achieve the specified task issued from a high-level astronaut command. The problem is mathematically formulated as designing the cooperative control for a general class of multiple-input-multiple-output (MIMO) dynamical systems in canonical form with arbitrary but finite relative degrees such that the outputs of the overall system converge to the explicitly given steady state. The proposed cooperative control for individual vehicle only need to use the sensed and communicated outputs information from its local neighboring vehicles. No fixed leader and time-invariant communication networks are assumed among vehicles. Particularly, a set of less-restrictive conditions on the connectivity of the sensor/communication networks are established, under which it is rigorously proven by using the newly found nice properties of the convergence of sequences of row stochastic matrices that the cooperative objective of the overall system can be achieved. Simulation results for a group of vehicles achieving a target and surrounding a specified object in formation are provided to support the proposed approach in this paper.
Many researches have developed different systematic approaches to analyze different network traffic sources for protecting the important network-based applications and services due to the dramatically increasing intru...
详细信息
Many researches have developed different systematic approaches to analyze different network traffic sources for protecting the important network-based applications and services due to the dramatically increasing intrusion behaviors. However, the data sources used in these approaches are usually flat without using concept hierarchy of data dimension. In order to reduce the effort of administrators to analyze the network behaviors, a Knowledge Acquisition of Behavior Model Construction (KABMC) schema is proposed in this paper to acquire the knowledge or the expertise of network behavior models. Consequently, Network Intrusion Monitoring System (NIMS) architecture including data preprocessing phase, concept hierarchy and data cube construction phase and data analysis phase is implemented to analyze network traffic data based upon the acquired behavior models. The experimental results show that several network behaviors can be easily visualized to assist junior administrators in discovering network behaviors.
In this paper an efficient user identification scheme based on ID-based cryptosystem is discussed. In this paper, it is indicated that Hwang et al., scheme is vulnerable to the forgery attack. And also improved scheme...
详细信息
In this paper an efficient user identification scheme based on ID-based cryptosystem is discussed. In this paper, it is indicated that Hwang et al., scheme is vulnerable to the forgery attack. And also improved scheme is quite similar to Hwang et al's scheme; the modified scheme is secure against the attack. The time complexity of computing the parameter a requires just one more modular multiplication operation. Thus, the scheme is not only far more secure but also efficient than Hwang et al's
As security monitoring grows both more complicated and more sophisticated, there is an increased demand for outsourcing these tasks to managed security service providers (MSSPs). However, the core problem of sharing p...
详细信息
As security monitoring grows both more complicated and more sophisticated, there is an increased demand for outsourcing these tasks to managed security service providers (MSSPs). However, the core problem of sharing private security logs creates a barrier to the widespread adoption of this business model. In this paper we analyze the logs used for security analysis with the concern of privacy and propose the constraints on anonymization of security monitor logs. We believe if the anonymization solution fulfills the constraints, MSSPs can detect the attacks efficiently and protect privacy simultaneously
暂无评论